Monitoring System Calls for Anomaly Detection in Modern Operating Systems

被引:0
|
作者
Eskandari, Shayan [1 ]
Khreich, Wael [1 ]
Murtaza, Syed Shariyar [1 ]
Hamou-Lhadj, Abdelwahab [1 ]
Couture, Mario [2 ]
机构
[1] Concordia Univ, Software Behav Anal SBA Res Lab, Montreal, PQ, Canada
[2] Def Res & Dev Canada, Software Anal & Robustness Grp, Valcartier, PQ, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Host-Based Intrusion Detection Systems; Address space layout randomization; data execution prevention; software security and reliability;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Host-based intrusion detection systems monitor systems in operation for significant deviations from normal (and healthy) behaviour. Many approaches have been proposed in the literature. Most of them, however, do not consider even the basic attack prevention mechanisms that are activated by default on today's many operating systems. Examples of such mechanisms include Address Space Layout Randomization and Data Execution Prevention. With such security methods in place, attackers are forced to perform additional actions to circumvent them. In this research, we conjecture that some of these actions may require the use of additional system calls. If so, one can trace such attacks to discover attack patterns that can later be used to enhance the detection power of anomaly detection systems. The purpose of this short paper is to motivate the need to investigate the impact of attack on system calls while trying to overcome these prevention mechanisms.
引用
收藏
页码:19 / +
页数:2
相关论文
共 50 条
  • [1] PROBABILISTIC ANOMALY DETECTION BASED ON SYSTEM CALLS ANALYSIS
    Maciolek, Przemyslaw
    Krol, Pawel
    Kozlak, Jaroslaw
    COMPUTER SCIENCE-AGH, 2007, 8 : 93 - 108
  • [2] Efficient Approach for Anomaly Detection in IoT Using System Calls
    Shamim, Nouman
    Asim, Muhammad
    Baker, Thar
    Awad, Ali Ismail
    SENSORS, 2023, 23 (02)
  • [3] Anomaly Detection Monitoring System for Healthcare
    Boloka, Tlou
    Crafford, Gerrie
    Mokuwe, Windy
    Van Eden, Beatrice
    2021 SOUTHERN AFRICAN UNIVERSITIES POWER ENGINEERING CONFERENCE/ROBOTICS AND MECHATRONICS/PATTERN RECOGNITION ASSOCIATION OF SOUTH AFRICA (SAUPEC/ROBMECH/PRASA), 2021,
  • [4] Differential analysis of Operating System indicators for anomaly detection in dependable systems: An experimental study
    Bondavalli, Andrea
    Ceccarelli, Andrea
    Brancati, Francesco
    Santoro, Diego
    Vadursi, Michele
    MEASUREMENT, 2016, 80 : 229 - 240
  • [5] An Architecture for Monitoring and Anomaly Detection for Space Systems
    Cortes, Edwin A.
    Rabelo, Luis
    SAE INTERNATIONAL JOURNAL OF AEROSPACE, 2013, 6 (01): : 81 - 86
  • [6] Container Anomaly Detection Using Neural Networks Analyzing System Calls
    Gantikow, Holger
    Zoehner, Tom
    Reich, Christoph
    2020 28TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING (PDP 2020), 2020, : 408 - 412
  • [7] Study on HMM Based Anomaly Intrusion Detection Using System Calls
    Shi Shang-zhe
    Sun Mei-feng
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ELECTRONIC & MECHANICAL ENGINEERING AND INFORMATION TECHNOLOGY (EMEIT-2012), 2012, 23
  • [8] Taking a Peek: An Evaluation of Anomaly Detection Using System calls for Containers
    Castanhel, Gabriel R.
    Heinrich, Tiago
    Ceschin, Fabricio
    Maziero, Carlos
    26TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2021), 2021,
  • [9] Intrusion detection by monitoring system calls with POSIX capabilities
    Haruyama, Takahiro
    Nakazato, Hidenori
    Tominaga, Hideyoshi
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2007, E90B (10) : 2646 - 2654
  • [10] System and Network Security: Anomaly Detection and Monitoring
    Vadursi, Michele
    Ceccarelli, Andrea
    Duarte, Elias P., Jr.
    Mahanti, Aniket
    JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2016, 2016 (2016)